Skip to main content

58
UPLOADS


Media Type
58
texts
Year
30
2017
5
2016
1
2015
22
(No Date)
Topics & Subjects
2
Activation Parameter
2
Computer Science
2
Harris Corner Detector
2
Iso-kinetic temperature
2
Security
2
machine learning
More right-solid
Collection
Creator
5
ijeacs uk
2
a.k. singh
2
jie xiong & caiyun liu
2
mahboobeh abdoos
1
a. k. singh
1
a. k.singh
More right-solid
Language
55
English
SHOW DETAILS
up-solid down-solid
eye
Title
Date Archived
Creator
Community Texts
texts
eye 22
favorite 0
comment 0
Task scheduling is an important aspect to improve the utilization of resources in the Cloud Computing. This paper proposes a Divide and Conquer based approach for heterogeneous earliest finish time algorithm. The proposed system works in two phases. In the first phase it assigns the ranks to the incoming tasks with respect to size of it. In the second phase, we properly assign and manage the task to the virtual machine with the consideration of ideal time of respective virtual machine. This...
Topics: Cloud Computing, Task Scheduling, Resource Allocation, Divide and Conquer, HEFT.
Community Texts
Sep 28, 2017 Ali Salem Ali Bin Sama, Saeed Mohammed Saeed Baneamoon
texts
eye 49
favorite 0
comment 0
Breast cancer is the most common form of cancer diseases among women and the second leading cause of cancer deaths worldwide. However, due to some limitations in mammography, it is difficult to classify a suspicious mass in the breast as malignant (cancerous) or benign. This paper attempts to classify the mammographic masses with high accuracy by combining entropy method with evolutionary algorithm (EA) and fuzzy logic. EA and fuzzy logic are applied at training phase for parameters tuning,...
Topic: Breast Cancer
The rate of alkaline hydrolysis of ethyl cinamate was measured over the temperature range of 20o C to 40 o C in watermethanol mixture at different composition 30 to 70% (v/v).The specific rate constant was calculated using second order reaction. The influence of solvent variation on reaction rate was examined in term of changes in the Activation parameter. Depletion of H* and S* value with simultaneous increase in G* of the reaction in media, reveals that the reaction is Enthalpy...
Topics: Activation Parameter, Solvent effect, solvent-solute interaction, Iso-kinetic temperature, specific...
The accurate spectrum sensing is a predominant aspect of any competent CR system. Efficient spectrum sensing enables a CR terminal to detect the spectrum holes (underutilized spectral bands) by providing high spectral resolution, thereby accrediting opportunistic transmission in the licensed band to the CR. In order to facilitate a good spectrum management and its efficient use a hybrid method for the detection of the spectrum with the purpose of detecting the presence of bands of unoccupied...
Topics: cognitive radio, spectrum sensing, energy detection, ROC, Matched Filter
Community Texts
texts
eye 30
favorite 0
comment 0
The solvent effect of aquo-dipolar protic solvent system was highlighted by studying the kinetics of base catalyzed solvolysis of ethyl cinnanmate in water-methanol media of various compositions having 20 to 70% (v/v)of ethanol at different five temp ranging from 20 to 400C. Fast decrease of specific rate constant with gradual addition of organic co solvent in the reaction media and also with increasing temperature of the reaction has been explained in light of solvation in initial and...
Topic: Enthalpy stimulator
Community Texts
Sep 9, 2017 Mallikarjun Mudda
texts
eye 50
favorite 0
comment 0
In the area of digitization and automation, the life of human being is getting simpler as almost everything is automated. Nowadays humans have made internet an integral part of their everyday life without which they are helpless. Internet of things (IoT) gives a platform which allows different devices to inter-connect, sense and control the things remotely across a network infrastructure without any limitation to the coverage area. In our proposed work, we stress on Wireless-...
Topics: Home Automation System, IoT, data storage, Raspberry Pi 3B, Web monitoring, Security credential
Community Texts
texts
eye 63
favorite 0
comment 0
In current scenario the entire world is moving towards digital communication for fast and better communication. But in this a problem rises with security i.e. when we have to store information (either data or image) at any casual location or transmit information through internet. As internet is an open transmission medium, security of data becomes very important. To defend our information from piracy or from hacking we use a technique and i.e. known as Encryption Technique. In this paper, we...
Topic: Genetic Algorithm
Community Texts
Aug 31, 2017 Oluwole O. Oyetoke
texts
eye 27
favorite 0
comment 0
In recent times, there has been a tectonic shift in the manner through which medical services are being rendered and the organization of the practice of Medicine as a whole. This tremendous diversification in the techniques employed for medical service delivery has noticeably been achieved through the integration of Engineering with medical sciences and the efficient latch of Medicine on constant improvements across the field of Computer and Electronic Engineering. Treatment of patients,...
Topics: Social Network, e-Health
Community Texts
Aug 31, 2017 Kuldeep Narayan Shukla
texts
eye 27
favorite 0
comment 0
Image enhancement is one of the challenging issues in image processing. The objective of Image enhancement is to process an image so that result is more suitable than original image for specific application. Digital image enhancement techniques provide a lot of choices for improving the visual quality of images. Appropriate choice of such techniques is very important. This paper will provide an overview and analysis of different techniques commonly used for image enhancement. Image enhancement...
Topic: Image Processing
Community Texts
Aug 31, 2017 M’hamed RAHMOUNI
texts
eye 39
favorite 0
comment 0
Computer systems engineering is based, increasingly, on models. These models permit to describe the systems under development and their environment at different abstraction levels. These abstractions allow us to conceive applications independently of target platforms. For a long time, models have only constituted a help for human users, allow to manually develop the final code of computer applications. The Model-Driven Engineering approach (MDE) consists of programming at the level of models,...
Topic: Web Technology and Engineering
Community Texts
Aug 31, 2017 Kuldeep N. Shukla
texts
eye 31
favorite 0
comment 0
Detecting and tracking objects are the most widespread and challenging tasks that a surveillance system must achieve to determine expressive events and activities, and automatically interpret and recover video content. An object can be a queue of people, a human, a head or a face. The goal of this article is to state the Detecting and tracking methods, classify them into different categories, and identify new trends, we introduce main trends and provide method to give a perception to...
Topic: Computer Science
Community Texts
Aug 30, 2017 Jie Xiong & Caiyun Liu
texts
eye 25
favorite 0
comment 0
Under the deregulation of generation market in China, all distributed generators will particular in electric power bidding. Therefore power purchase cost optimization (PPCO) problem has been getting more attention of power grid Company. However, under the competition principle, they can purchase power from several of power plants, therefor, there exist continuous and integral variables in purchase cost model, which is difficult to solve by classical linear optimization method. An improved...
Topics: Power market, Power purchase cost optimization, Improved Differential Evolution, Adaptive parameter
Community Texts
Aug 30, 2017 Jie Xiong & Caiyun Liu
texts
eye 22
favorite 0
comment 0
The magnetotelluric (MT) method has become more widely used in hydrocarbon exploration. The inversion of MT data, which can determine the electrical structure of subsurface, is a nonlinear and multimodal optimization problem. Particle swarm optimization (PSO) algorithm is a good solver for this geophysical inversion problem, whereas it has a shortage of heavy computation time. An improved parallel adaptive PSO inversion algorithm for MT data is proposed in order to decrease the computation...
Topics: improved parallel PSO, non-linear inversion, Magnetotelluric (MT), coarse granularity
As the arena movements to superior ability for recorded purposes, the usage of Cloud Service Providers (CSPs) are increasing more ubiquity. With the steady increment of disbursed garage adopters, records de-duplication has become a want for cloud providers. In distributed storage administrations statistics de-duplication is one of crucial structures to lessen the distance requirements of administrations by way of casting off replica duplicates of rehashing facts and setting away unmarried...
Topics: Deduplication, Cloud Providers, Encryption, Security
Community Texts
texts
eye 22
favorite 1
comment 0
The Internet of Things (IOT) is the arrangement of physical articles or "things" introduced with equipment, programming, sensors, and framework accessibility, which enables these things to accumulate and exchange data. Here outlining security convention for the Internet of Things, and execution of this relating security convention on the inserted gadgets. This convention will cover the honesty of messages and verification of every customer by giving a productive confirmation...
Topics: Security, SSL, SN, IOT.
Community Texts
texts
eye 36
favorite 0
comment 0
Generally HBASE is NoSQL database which runs in the Hadoop environment, so it can be called as Hadoop Database. By using Hadoop distributed file system and map reduce with the implementation of key/value store as real time data access combines the deep capabilities and efficiency of map reduce. Basically testing is done by using single node clustering which improved the performance of query when compared to SQL, even though performance is enhanced, the data retrieval becomes complicated as...
Topics: Database, Cluster, Hadoop, HDFS, MapReduce.
Community Texts
Jul 2, 2017
texts
eye 102
favorite 0
comment 0
This paper aims to highlight distinct features of Big of information. We are living on the planet with huge varieties and tremendous volume of data Information is the new money. Data is being generated by sensors, digital images, activities in social media sites, forensic science, business informatics, research activities across various domains and many other internet based events as either source data or as cumulative to the existing data. This data increase from time to time exponentially...
Topics: Big Data management, Big Data analytics, Big Data analyzing technique.
Digital images are prone to a variety of noises. Denoising of image is a crucial fragment of image reconstruction procedure. Noise gets familiarized in the course of reception and transmission, acquisition and storage & recovery processes. Hence de-noising an image becomes a fundamental task for correcting defects produced during these processes. A complete examination of the various noises which corrupt an image is included in this paper. Elimination of noises is done using various...
Topics: Image de-noising, Image restoration techniques, Noise models, Average filter, Median filter,...
Image stitching is a technique which is used for attaining a high resolution panoramic image. In this technique, distinct aesthetic images that are imaged from different view and angles are combined together to produce a panoramic image. In the field of computer graphics, photographic and computer vision, Image stitching techniques are considered as current research areas. For obtaining a stitched image it becomes mandatory that one should have the knowledge of geometric relations among...
Topics: SIFT, SURF, RANSAC, Harris Corner Detector, Panoramic Image.
Image stitching is a technique which is used for attaining a high resolution panoramic image. In this technique, distinct aesthetic images that are imaged from different view and angles are combined together to produce a panoramic image. In the field of computer graphics, photographic and computer vision, Image stitching techniques are considered as current research areas. For obtaining a stitched image it becomes mandatory that one should have the knowledge of geometric relations among...
Topics: SIFT, SURF, RANSAC, Harris Corner Detector, Panoramic Image.
Community Texts
texts
eye 20
favorite 0
comment 0
For those organization for vast number about IoT devices, progressively vast amounts about information need aid produced, which abandons provision suppliers confronting new tests especially for administration to security. Information security might make attained utilizing cryptographic encryption strategies. Cryptographic keys are needed will unscramble data, Furthermore must a chance to be disseminated to An specific best approach will commissioned information clients that perform dissimilar...
Topics: Internet of things, security, attribute-based encryption, pre-computation, sensors.
Community Texts
texts
eye 23
favorite 0
comment 0
In this work, fingerprint and palm print multi-modal biometric security system is proposed. In this proposed work some of the common features of finger print and palm print images are identified and the process is carried out for authentication. At first, the preprocessing steps are completed on chosen images which include binarization, thinning and minute extraction. Binarization is for identifying the important ridges of finger print and palm print images and later on thinning is applied to...
Topics: Finger Print, Palm Print, Multi-Modal Biometrics, Binarization, Thinning, Minute Extraction, Fuzzy...
The usage of internet and requirement for data transmission is at tremendous demand. People are more dependent on the internet compared to previous decades. So with the increase in number of users, spectrum is becoming congested. Presently Wi-Fi technology is popular which runs on radio frequency waves having less bandwidth so, to have a larger bandwidth for greater data transfer rate Li-Fi has been introduced. Li-Fi uses visible light spectrum having bandwidth 10,000 times more than radio...
Topics: c-Light fidelity (Li-Fi), Solar Panel, Fresnel Solar Concentrator.
Community Texts
Apr 30, 2017 Zahida Parveen
texts
eye 17
favorite 0
comment 0
In this paper, we use the clustering technique to monitor the status of students’ scholastic recital. This paper spotlights on upliftment the education system via K-means clustering. Clustering is the process of grouping the similar objects. Commonly in the academic, the performances of the students are grouped by their Graded Point (GP). We adopted Kmeans algorithm and implemented it on students’ mark data. This system is a promising index to screen the development of students and...
Topics: student’s performance, k-means clustering, Blended Learning, gifted students.
The rate of alkaline hydrolysis of ethyl cinnamate was measured over the temperature range of 20o C to 40 o C in water-acetone mixture at different composition 30 to 70% (v/v). The influence of solvent variation on reaction rate was examined in term of changes in the activation parameter. Depletion of H* and S* value with simultaneous increase in G* of the reaction in reaction media, reveals that the reaction is Enthalpy domination and Entropy controlled. The Iso- dielectric activation...
Topics: Activation Parameter, solvent-solute interaction, Iso-kinetic temperature, specific salvation, Iso...
Community Texts
texts
eye 22
favorite 0
comment 0
In this communication era, wireless sensor network places a vital role. Wireless sensor network comprises of various types of sensor networks. Deployment of sensor nodes in wireless sensor network is a major concern to optimal result. There are various techniques in deploying the wireless sensor node. Among those some of the methods are, randomized method of deployment, grid based deployment, contour based deployment and projection based deployment. In this paper we are comparing all above...
Topics: Coverage, Connectivity, Deployment, Energy
Community Texts
texts
eye 16
favorite 0
comment 0
Energy is one of the main network resources that is used in mobile devices. We proposed an energy efficient routing techniques called reliable minimum energy cost routing (RMECR) and comparing with reliable minimum energy routing (RMER) which are used by the nodes in the most efficient manner. RMER and RMECR works on the basis of balancing the energy of the nodes so that the nodes with maximum energy can do the work and the nodes with less than certain threshold energy required to do a certain...
Topics: RMECR protocol, wireless network, mobile devices, reliability, prolonged lifetime
In this paper, the test portrayal strategies of nonlinear measurements of wideband LNA exhibitions are simulated. Likewise, significance of the nonlinear estimations has been portrayed unmistakably with microwave LNA operating large signal analysis had been assessed. This work is endeavored to demonstrate the performances of the LNA with AM-AM, AM-PM measurements in points of interest and differentiating from the linear measurement regime. The most of the important aspects of LNA will be in...
Topics: wideband LNA, Nonlinear measurements, microwave and harmonics.
Community Texts
texts
eye 37
favorite 0
comment 0
With the emergence of Web 2.0 applications that bestow rich user experience and convenience without time and geographical restrictions, web usage logs became a goldmine to researchers across the globe. User behavior analysis in different domains based on web logs has its utility for enterprises to have strategic decision making. Business growth of enterprises depends on customer-centric approaches that need to know the knowledge of customer behavior to succeed. The rationale behind this is that...
Topic: Knowledge
Community Texts
texts
eye 20
favorite 0
comment 0
Technologies are constantly evolving. In order to benefit from technological advances, it is necessary to adapt the applications to these technologies. This operation is expensive for companies because it is often necessary to rewrite the code entirely. Where there is no capitalization of application functions and development is generally based on source code, the separation of concerns appears to be the necessary solution to the problem. Thus, functional specifications and technical...
Topic: MDA
Community Texts
texts
eye 16
favorite 0
comment 0
The vital objective of artificial intelligence is to discover and understand the human competences, one of which is the capability to distinguish several text objects within one or more images exhibited on any canvas including prints, videos or electronic displays. Multimedia data has increased rapidly in past years. Textual information present in multimedia contains important information about the image/video content. However it needs to technologically verify the commonly used human...
Topic: content based retrieval
Community Texts
texts
eye 62
favorite 0
comment 0
This paper describes the function used in databases for performing the calculations, modifies the data items and does manipulations on data. It defines the functions, their syntax’s and errors occurred during the process. Functions are applied on oracle having SQL and are illustrated through query processing.
Topic: SQL
Community Texts
texts
eye 29
favorite 0
comment 0
Due to the growing need for high-performance and low-cost software applications and the increasing competitiveness, the industry is under pressure to deliver products with low development cost, reduced delivery time and improved quality. To address these demands, researchers have proposed several development methodologies and frameworks. One of the latest methodologies is software product line (SPL) which utilizes the concepts like reusability and variability to deliver successful products with...
Topic: Software Product Line
Community Texts
texts
eye 29
favorite 0
comment 0
Distributed systems deadlock is similar to single-processor system deadlock, but is worse. It is harder to avoid, prevent or detect and is harder to cure, when it is tracked down because all the relevant information is scattered over many machines. In some systems, such as distributed database systems, it can be extremely serious, so it is important to understand how it differs from ordinary deadlock and what can be done about it. Two important deadlock prevention algorithms in distributed...
Topic: Lock
Community Texts
texts
eye 11
favorite 0
comment 0
Distributed systems deadlock is similar to single-processor system deadlock, but is worse. It is harder to avoid, prevent or detect and is harder to cure, when it is tracked down because all the relevant information is scattered over many machines. In some systems, such as distributed database systems, it can be extremely serious, so it is important to understand how it differs from ordinary deadlock and what can be done about it. Two important deadlock prevention algorithms in distributed...
Topic: Deadloack
Community Texts
texts
eye 12
favorite 0
comment 0
Distributed systems deadlock is similar to single-processor system deadlock, but is worse. It is harder to avoid, prevent or detect and is harder to cure, when it is tracked down because all the relevant information is scattered over many machines. In some systems, such as distributed database systems, it can be extremely serious, so it is important to understand how it differs from ordinary deadlock and what can be done about it. Two important deadlock prevention algorithms in distributed...
Topic: Deadlock
Community Texts
Mar 1, 2017 Mahboobeh Abdoos
texts
eye 9
favorite 0
comment 0
Distributed systems deadlock is similar to single-processor system deadlock, but is worse. It is harder to avoid, prevent or detect and is harder to cure, when it is tracked down because all the relevant information is scattered over many machines. In some systems, such as distributed database systems, it can be extremely serious, so it is important to understand how it differs from ordinary deadlock and what can be done about it. Two important deadlock prevention algorithms in distributed...
Topics: Deadlock Prevention, Distributed Systems, Algorithm, Process.
Community Texts
texts
eye 29
favorite 0
comment 0
The kinetic of alkaline hydrolysis of Ethyl Cinnamate was investigated at different percentage of aqua-organic solvent mixture with Acetone (30 to 70% v/v) over the temperature range of 20o C  ...
Topics: Solvolysis, Solvent-solute interaction, Iso composition Energy, Activated complex, Activation...
Community Texts
Mar 1, 2017 Nazish Fatima, Zahida Parveen
texts
eye 49
favorite 0
comment 0
Cloud computing is an arrangement of Information Technology administrations offered to clients over the web on a leased base. Such administrations empower the associations to scale-up or downsize their in-house establishments. By and large, cloud administrations are given by an outside supplier who has the game plan. Cloud computing has numerous focal points, for example, adaptability, productivity, versatility, combination, and capital lessening. In addition, it gives a progressed virtual...
Topics: Could Computing, Security
This proposed work investigates the effects of biasing circuit in the ultra-wideband microwave low noise amplifier which operates between 3GHz to 10GHz. The complete circuit is visualized the importance of every component in the design with respect to linear measurements like Gain, Noise Figure, Return loss under unconditionally stable condition. The design and realization are made by using Hybrid Microwave integrated circuit in AWR microwave office. The thing that is absolutely necessary and...
Topics: PHEMT, Biasing Networks, AWR microwave office, Impedance matching, HMIC and LNA
Community Texts
Feb 25, 2017 Fazal Qudus Khan
texts
eye 55
favorite 0
comment 0
Sign language is a communication language preferred and used by a deaf person to converse with the common people in the community. Even with the existence of the sign language, there exist a communication gap between the normal and the disable/deaf person. Some solutions such as sensor gloves already are in place to address this problem area of communication, but they are limited and are not covering all parts of the language as required by the deaf person for the ordinary person to understand...
Topic: Human Computer Interaction
This paper is located within the 21st century global debates about the impact of e-learning as one of the ICT on students’ achievements in teaching and learning process in universities. From the perspectives of Tanzania, this paper provides a model for measuring the impact of e-learning on students’ achievements in universities. The rationale for the investigation stems from the notion that despite the hundreds impact studies, the impacts of e-learning on student’s achievements remain...
Topics: e-learning, university education
Community Texts
Jan 24, 2017 Prasad B
texts
eye 66
favorite 0
comment 0
Now a day everyone is having a passion of playing Survival games so, keeping on mind this project gives a best experience on playing the best escaping game. Usually this game consists of very high visual graphics. Ball is the main player in the game designed, the main aim of the player is to hold its life and reach from source to destination by escaping from the different disturbances like obstacle which come in between. Game has many modules mainly Ball control, Checkpoints, Enemy kill and...
Topics: Survival games, Escaping game, Javascript, Visual Effects
Community Texts
texts
eye 39
favorite 0
comment 0
This paper deals with the inevitable consequence of the convenience and efficiency we benefit from the open, networked control system operation of safety-critical applications: vulnerability to such system from cyber-attacks. Even with numerous metrics and methods for intrusion detection and mitigation strategy, a complete detection and deterrence of internal code flaws and outside cyber-attacks has not been found and would not be found anytime soon. Considering the ever incompleteness of...
Topics: Component, Supervisory Control and Data Acquisition System, Smart Grid, Power Substation,...
Community Texts
Jan 24, 2017 Priti Srinivas Sajja
texts
eye 46
favorite 0
comment 0
Development of an expert system is difficult because of two challenges involve in it. The first one is the expert system itself is high level system and deals with knowledge, which make is difficult to handle. Second, the systems development is more art and less science; hence there are little guidelines available about the development. This paper describes computer aided development of intelligent systems using modem artificial intelligence technology. The paper illustrates a design of a...
Topics: Fuzzy logic, Neural network, Neuro-fuzzy systems, Soft computing, Automatic development
Community Texts
Jan 24, 2017 Ejaz Ul Haq
texts
eye 71
favorite 0
comment 0
Data mining is an integrated field, depicted technologies in combination to the areas having database, learning by machine, statistical study, and recognition in patterns of same type, information regeneration, A.I networks, knowledge-based portfolios, artificial intelligence, neural network, and data determination. In real terms, mining of data is the investigation of provisional data sets for finding hidden connections and to gather the information in peculiar form which are justifiable and...
Topics: cluster analysis, comportment, relegation, algorithms, natural, distribution, hypothesis
Community Texts
Jan 24, 2017 Asif Irshad Khan
texts
eye 29
favorite 0
comment 0
Component-based software development (CBD) promises development of high-quality trustworthy software systems within specified budget and deadline. The selection of the most appropriate component based on specific requirement plays a vital role for high-quality software product. Multi-Agent software (MAS) engineering approach played a crucial role for selection of the most appropriate component based on a specific requirement in a distributed environment. In this paper, multi agent technique is...
Topics: Component selection, Component based development, COTS, Multi Agent Software Engineering
Community Texts
Jan 4, 2017 Mahboobeh Abdoos
texts
eye 26
favorite 0
comment 0
Body area sensor network is an important technology which is suitable for monitoring the patient’s health and real time diagnosing the diseases. The body area network includes the sensors which can be spread over the body or the wearable cloth and a coordinator node which can be a mobile or a tablet or a PDA, which receives the signal of a person’s sensors. In the new architecture the coordinator node sends the information to the central data server via internet or GPRS or MANET. The...
Topics: Architecture, Health care, Sensor, MANET
Community Texts
Jan 3, 2017 Tanu Jindal
texts
eye 48
favorite 0
comment 0
From previous year researches, it is concluded that testing is playing a vital role in the development of the software product. As, software testing is a single approach to assure the quality of the software so most of the development efforts are put on the software testing. But software testing is an expensive process and consumes a lot of time. So, testing should be start as early as possible in the development to control the money and time problems. Even, testing should be performed at every...
Topics: Software Engineering, SDLC, Software testing, Verification and Validation.
Community Texts
Jan 3, 2017 Farrukh Nadeem, Mahreen Nasir
texts
eye 48
favorite 0
comment 0
Use of Grid Computing for carrying out cooperative work from distributed resources has been into practice for the past several years. Efficient execution of various tasks on the grid comes with various challenges. One of them is to ensure that a particular resource remains available during the execution of task. The dynamic nature of resources makes it even more challenging to predict resource availability for complete task duration. This paper is an attempt to address this issue by providing a...
Topics: resource availability, grid computing, data mining, machine learning, survey
Community Texts
Jan 3, 2017 Kamalinder Kaur, Nupur
texts
eye 41
favorite 0
comment 0
Now a days the work is being done by hiring the space and resources from the cloud providers in order to do work effectively and less costly. This paper describes the cloud, its challenges, evolution, attacks along with the approaches required to handle data on cloud. The practice of using a network of remote servers hosted on the Internet to store, manage, and process data, rather than a local server or a personal computer. The need of this review paper is to provide the awareness of the...
Topics: cloud, SAAS, providers, SOA, resources.
Community Texts
texts
eye 90
favorite 0
comment 0
Malware is the main threat for all computing environments. It also acts as launching platform for many other cyber threats. Traditional malware detection system is not able to detect “modern”, “unknown” and “zero-day” malware. Recent developments in computing hardware and machine learning techniques have emerged as alternative solution for malware detection. The efficiency of any machine learning algorithm depends on the features extracted from the dataset. Various types of features...
Topics: malware, computing environment, cyber-threat, feature type, machine learning
A location service gives the requested location information to the nodes in the ad hoc networks. It is supposed that there are different clusters in the different levels. Every cluster has a cluster head. The clusters can be logical or physical. The higher level cluster heads have the information of the tables of lower level cluster heads. The information of tables of a cluster head is updated periodically by its lower level cluster heads. The combination of the cluster and position based...
Topics: Ad hoc network, position service, fault tolerant, cluster, protocol.
Community Texts
texts
eye 114
favorite 0
comment 0
Hacking has become an extensive trouble with the beginning of the digital age, almost worldwide access to the internet and other digital media. It is significant for individuals, corporations, and the government to guard them from being susceptible to such attacks. The purpose of this paper is to provide information about ethical hacking; their skill to share advanced security knowledge and capabilities with organization and pointing out their vulnerabilities.
Topics: hackers, ethical hacking, risk management, risk assessment, network hacking.
Community Texts
texts
eye 21
favorite 0
comment 0
It is considerably recognized that in software engineering, the utilization of metrics at the initial stages of the object oriented software can encourage designers to bring about a noticeable improvement decisions. In this paper, a literature review and classification scheme for software complexity measurement researches is presented. The study shows that an expanding volume of complexity measurement has been conducted in diverse range of areas. As software complexity is an important factor...
Topic: Complexity
Community Texts
Dec 16, 2016 IJEACS UK
texts
eye 26
favorite 0
comment 0
Due to continuous change in business requirements and to implement proactive, adaptive maintenance procedures in application program; it is required to evolve application program time to time. Program comprehension is a process of program understanding and reverse engineering, which supports the analyst to easily undertake the program for further reengineering. This paper highlights the program elements, components, its analytical solutions for understanding, comprehensions and extension.
Topics: Program Comprehension, Analysis
Community Texts
texts
eye 46
favorite 0
comment 0
Sign languages use visual pattern to communicate rather than acoustic patterns that are communication mode in verbal communication. Sign languages being the most structured form of gestures can be considered as the benchmark for systems of gesture recognition. SLR has got its applicability in the areas of appliances control, robot control, interactive learning, industrial machine control, virtual reality, games, simulations etc. apart from its significance for hearing impaired community. The...
Topic: Sign language
Community Texts
Dec 16, 2016 Empirical Research Press Ltd. UK
texts
eye 53
favorite 0
comment 0
International Journal of Engineering and Applied Computer Science (IJEACS)
Topics: Computer Science, Engineering